Laser scanning has become a popular technique for the acquisition of digital models in the field of cultural heritage conservation and restoration nowadays. Many archaeological sites were lost, damaged, or faded, rather than being passed on to future generations due to many natural or human risks. It is still a challenge to accurately produce the digital and physical model of the missing regions or parts of our cultural heritage objects and restore damaged artefacts. The typical manual restoration can become a tedious and error-prone process; also can cause secondary damage to the relics. Therefore, in this paper, the automatic digital application process of 3D laser modelling of artefacts in virtual restoration is presented based on reverse engineering techniques. Two case studies were selected and processed in Iraq to meet the aim of this research and show how reverse engineering approaches can save our culture. The efficiency and safety of the preservation and restoration of cultural relics are improved and visually demonstrated. Different reverse engineering techniques applied to show the geometric potential for such approaches following laser-based 3D data application.
This study came for the reason that some project administrations still do not follow the appropriate scientific methods that enable them to perform their work in a manner that achieves the goals for which those projects arise, in addition to exceeding the planned times and costs, so this study aims to apply the methods of network diagrams in Planning, scheduling and monitoring the project of constructing an Alzeuot intersection bridge in the city of Ramadi, as the research sample, being one of the strategic projects that are being implemented in the city of Ramadi, as well as being one of the projects that faced during its implementation Several of problems, the project problem was studied according to scientific methods through the applica
... Show More
The research aims to identify the factors that affect the quality of the product by using the Failure Mode and Effect Analysis (FMEA) tool and to suggest measures to reduce the deviations or defects in the production process. I used the case study approach to reach its goals, and the air filter product line was chosen in the air filters factory of Al-Zawraa General Company. The research sample was due to the emergence of many defects of different impact and the continuing demand for the product. I collected data and information from the factory records for two years (2018-2019) and used a scheme Pareto Fishbone Diagram as well as an FMEA tool to analyze data and generate results.
Par
... Show MorePatients are very concerned about the lengthy nature of orthodontic treatment. It is necessary to find a non-invasive way to quicken physiologic tooth movement. This study's objective was to assess the effectiveness of low-intensity laser therapy in shortening the time and discomfort of orthodontic treatment. Experimental work: Using a split-mouth study to compare tooth movement with conventional treatment and laser-accelerated orthodontic tooth movement. A patient presenting with a class II division I malocclusion characterized by the misalignment of the upper and lower teeth as classified by Angle’s molar classification system was indicated to undergo fixed orthodontic appliance orthodontic treatment. The treatment plan involved bila
... Show MoreIn petroleum reservoir engineering, history matching refers to the calibration process in which a reservoir simulation model is validated through matching simulation outputs with the measurement of observed data. A traditional history matching technique is performed manually by engineering in which the most uncertain observed parameters are changed until a satisfactory match is obtained between the generated model and historical information. This study focuses on step by step and trial and error history matching of the Mishrif reservoir to constrain the appropriate simulated model. Up to 1 January 2021, Buzurgan Oilfield, which has eighty-five producers and sixteen injectors and has been under production for 45 years when it started
... Show MoreObjectives. This study was carried out to quantitatively evaluate and compare the sealing ability of Endoflas by using differentobturation techniques. Materials and Methods. After 42 extracted primary maxillary incisors and canines were decoronated, theircanals were instrumented with K files of size ranging from #15 to #50. In accordance with the obturation technique, the sampleswere divided into three experimental groups, namely, group I: endodontic pressure syringe, group II: modified disposable syringe,and group III: reamer technique, and two control groups. Dye extraction method was used for leakage evaluation. Data wereanalyzed using one-way ANOVA and Dunnett’s T3 post hoc tests. The level of significance was set at p<0:05. Results.
... Show MoreBusiness organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show MorePlagiarism is becoming more of a problem in academics. It’s made worse by the ease with which a wide range of resources can be found on the internet, as well as the ease with which they can be copied and pasted. It is academic theft since the perpetrator has ”taken” and presented the work of others as his or her own. Manual detection of plagiarism by a human being is difficult, imprecise, and time-consuming because it is difficult for anyone to compare their work to current data. Plagiarism is a big problem in higher education, and it can happen on any topic. Plagiarism detection has been studied in many scientific articles, and methods for recognition have been created utilizing the Plagiarism analysis, Authorship identification, and
... Show MoreWe propose an intraguild predation ecological system consisting of a tri-trophic food web with a fear response for the basal prey and a Lotka–Volterra functional response for predation by both a specialist predator (intraguild prey) and a generalist predator (intraguild predator), which we call the superpredator. We prove the positivity, existence, uniqueness, and boundedness of solutions, determine all equilibrium points, prove global stability, determine local bifurcations, and illustrate our results with numerical simulations. An unexpected outcome of the prey's fear of its specialist predator is the potential eradication of the superpredator.
In a quick reading of the character of Camille Ben Ziad al-Nekha al-Kufi al-Taabi, one of the most sincere companions of Imam Ali (peace be upon him), he enjoyed great status and status because he was one of the people of his people who lived alongside Imam Ali (peace be upon him) since his tribe migrated from Yemen to Kufa To this end, he became loyal during the reign of Imam Ali (peace be upon him), who is also a member of the delegation coming from Kufa to protest against the actions of the Wali of Kufa during the reign of Caliph Uthman ibn Affan. After the death of Caliph Uthman bin Affan, (Peace and blessings of Allaah be upon him) (Duaa kamil), one of the most famous and important supplications in Islamic history, and each one of u
... Show More